SlideShare a Scribd company logo
Mobile Security
Presented By
Himmat Purohit
Introduction
 This information is for people that have personal
smartphones
 For people that have company smartphones, contact your
companies mobile security policy
Mobile security
Why does a person need to
secure a smartphone?
 As cell phones are becoming more like pocket-sized
computers, they are also more vulnerable to different
forms of cyber attacks
 People want your data! This is a fact of life and it applies
to either if you have an Android, BlackBerry, or iPhone
smartphone
Password Protection
 By simply enabling a password or PIN number on a cell
phone, you can save yourself a tremendous amount of
hassle and headache because only you know that unique
password
 You may be able to set a security on the phone so that if
someone tries the wrong password a certain number of
times, the phone is automatically wiped
Anti-virus Software
 A person must treat a cell phone like they would a PC by
installing and keeping an up to date anti-virus software
 Lookout Mobile Security (Android)
 SmartGuard Mobile Security (BlackBerry)
 iPhones does not have an anti-virus software
 A security app safeguards your data, protect against
threats, and an up-to-date software protects the device
from new versions of viruses and new malware
Up-to-date operating system
 Smartphones need to be patched often to eliminate
vulnerabilities found since the phone was first
released
 Updates gets rid of security holes or vulnerabilities
by maintaining the software on both your PC and
your smartphone
Get apps from a trusted source
 There are plenty of apps out there, stick to apps from the
phones market
 Android Play Market
 BlackBerry App World
 iPhone App Market
 If you’re downloading an app from a third party, do your
research to make sure the app is reputable and will do
what you want that app to do
Wi-Fi Network
 Avoid shopping or banking on a public network
 Keep in mind that the open Wi-Fi network that your
phone is connected to might not be secure
 Limit your activity to browsing and avoid committing
any transaction that involves your account
information
 Also, be wary about people looking over your shoulder
and seeing your password, e-mails, texts, and account
information
Bluetooth devices
 Although many people think of bluetooth as a better
alternative to a physical wire, in fact it creates a personal
area network, and like any network, it will recognize
appropriate devices within its range
 A phone's bluetooth setting is on by default, so it needs
to be turned off, or configured for a specific device or
headset
Backup your data
 If your phone gets taken or the data gets deleted, it’s a
lot easier to get your information back when it’s backup
regularly
 It can mean the difference between a slight phone
setback or living through your own phone nightmare
Conclusion
 Doing these simple tips with help keep your phone
protected from vulnerabilities that might happen to you
 Password Protection
 Anti-virus Software
 Up-to-date operating system
 Get apps from a trusted source
 Wi-Fi Network
 Bluetooth devices
 Backup your data
Thank You

More Related Content

What's hot

Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
Quick Heal Technologies Ltd.
 
Mobile security
Mobile securityMobile security
Mobile security
Mphasis
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
Lisa Herrera
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Xavier Mertens
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
Imran Khan
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
The TNS Group
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 

What's hot (20)

Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Similar to Mobile security

Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
4Freedom Mobile
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
iYogi
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
Marie Weaver
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
Hîmãlåy Làdhä
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
whitecryption
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
acijjournal
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
todd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
glendar3
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric data
nishiyath
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 

Similar to Mobile security (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
How to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptxHow to Keep Your Phone Safe from Hackers (1).pptx
How to Keep Your Phone Safe from Hackers (1).pptx
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Tips of Mobile Application Security
Tips of Mobile Application SecurityTips of Mobile Application Security
Tips of Mobile Application Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Safety of my biometric data
Safety of my biometric dataSafety of my biometric data
Safety of my biometric data
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 

Mobile security

  • 2.
  • 3. Introduction  This information is for people that have personal smartphones  For people that have company smartphones, contact your companies mobile security policy
  • 5. Why does a person need to secure a smartphone?  As cell phones are becoming more like pocket-sized computers, they are also more vulnerable to different forms of cyber attacks  People want your data! This is a fact of life and it applies to either if you have an Android, BlackBerry, or iPhone smartphone
  • 6. Password Protection  By simply enabling a password or PIN number on a cell phone, you can save yourself a tremendous amount of hassle and headache because only you know that unique password  You may be able to set a security on the phone so that if someone tries the wrong password a certain number of times, the phone is automatically wiped
  • 7. Anti-virus Software  A person must treat a cell phone like they would a PC by installing and keeping an up to date anti-virus software  Lookout Mobile Security (Android)  SmartGuard Mobile Security (BlackBerry)  iPhones does not have an anti-virus software  A security app safeguards your data, protect against threats, and an up-to-date software protects the device from new versions of viruses and new malware
  • 8. Up-to-date operating system  Smartphones need to be patched often to eliminate vulnerabilities found since the phone was first released  Updates gets rid of security holes or vulnerabilities by maintaining the software on both your PC and your smartphone
  • 9. Get apps from a trusted source  There are plenty of apps out there, stick to apps from the phones market  Android Play Market  BlackBerry App World  iPhone App Market  If you’re downloading an app from a third party, do your research to make sure the app is reputable and will do what you want that app to do
  • 10. Wi-Fi Network  Avoid shopping or banking on a public network  Keep in mind that the open Wi-Fi network that your phone is connected to might not be secure  Limit your activity to browsing and avoid committing any transaction that involves your account information  Also, be wary about people looking over your shoulder and seeing your password, e-mails, texts, and account information
  • 11. Bluetooth devices  Although many people think of bluetooth as a better alternative to a physical wire, in fact it creates a personal area network, and like any network, it will recognize appropriate devices within its range  A phone's bluetooth setting is on by default, so it needs to be turned off, or configured for a specific device or headset
  • 12. Backup your data  If your phone gets taken or the data gets deleted, it’s a lot easier to get your information back when it’s backup regularly  It can mean the difference between a slight phone setback or living through your own phone nightmare
  • 13. Conclusion  Doing these simple tips with help keep your phone protected from vulnerabilities that might happen to you  Password Protection  Anti-virus Software  Up-to-date operating system  Get apps from a trusted source  Wi-Fi Network  Bluetooth devices  Backup your data